کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
456379 695706 2016 22 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Revocation and update of trust in autonomous delay tolerant networks
ترجمه فارسی عنوان
لغو و به روزرسانی اعتماد در شبکه های تحمل کننده تاخیری مستقل
کلمات کلیدی
شبکه تحمل پذیری تاخیر خود مختار، مدیریت کلیدی، لغو کلیدی، اعتماد، شهرت
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی


• We model a decentralised security credential revocation and replacement scheme.
• We utilise leverage of common friends trust concepts for trust transferral on keys.
• We propose a revocation scheme to provide entity confidence and trust transferral.
• We compare similar schemes on key and certificate removal and replacement metrics.
• Proposal distributes credentials 35% faster, slowed spoofed credentials by 50%.

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

Graphical AbstractFigure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Security - Volume 60, July 2016, Pages 15–36
نویسندگان
, , , ,